Category: Attack

Popular Remote Desktop Software Mandates Password Reset

[ad_1] Feb 03, 2024NewsroomCyber Attack / Software Security Remote desktop software maker AnyDesk disclosed on…

Russian APT28 Hackers Targeting High-Value Orgs with NTLM Relay Attacks

[ad_1] Russian state-sponsored actors have staged NT LAN Manager (NTLM) v2 hash relay attacks through…

DirtyMoe Malware Infects 2,000+ Ukrainian Computers for DDoS and Cryptojacking

[ad_1] Feb 02, 2024NewsroomCryptojacking / Malware The Computer Emergency Response Team of Ukraine (CERT-UA) has…

Integrating Insights from Recorded Future to Revolutionize Cloud Security

[ad_1] Feb 02, 2024The Hacker NewsThreat Intelligence / Cloud Security Cloudzy, a prominent cloud infrastructure…

Former CIA Engineer Sentenced to 40 Years for Leaking Classified Documents

[ad_1] Feb 02, 2024NewsroomNational Security / Data Breach A former software engineer with the U.S.…

INTERPOL Arrests 31 in Global Operation, Identifies 1,900+ Ransomware-Linked IPs

[ad_1] Feb 02, 2024NewsroomCyber Crime / Malware An INTERPOL-led collaborative operation targeting phishing, banking malware,…

Nation-State Hackers Access Source Code and Internal Docs

[ad_1] Feb 02, 2024NewsroomData Breach / Cloud Security Cloudflare has revealed that it was the…

FritzFrog Returns with Log4Shell and PwnKit, Spreading Malware Inside Your Network

[ad_1] Feb 01, 2024NewsroomCyber Attack / Botnet The threat actor behind a peer-to-peer (P2P) botnet…

Exposed Docker APIs Under Attack in ‘Commando Cat’ Cryptojacking Campaign

[ad_1] Feb 01, 2024NewsroomCryptojacking / Linux Security Exposed Docker API endpoints over the internet are…

Why the Right Metrics Matter When it Comes to Vulnerability Management

[ad_1] How's your vulnerability management program doing? Is it effective? A success? Let's be honest,…